Skip to content

Integrations Overview

Overwatch integrates with major observability platforms through webhooks. Each integration provides a unique HTTPS endpoint that your monitoring tool sends alerts to. Overwatch normalizes incoming payloads into a standard format, creates incidents, and triggers AI-powered diagnosis regardless of the source platform.

These platforms send alerts to Overwatch via webhooks:

PlatformAlert FormatKey Context ExtractedChrome Extension
DatadogCustom webhookTags (service, env, cluster), monitor ID, hostYes
GrafanaAlertmanager-compatibleLabels, annotations, dashboard/panel URLs, rule definitionsYes
PrometheusAlertmanager webhook v4Labels (job, instance, namespace, pod), annotationsYes (localhost)
New RelicWorkflow webhookEntity data (GUID, type, domain), conditions, policies, entity tagsYes
PagerDutyGeneric Webhook V3Incident data + upstream source detection (CloudWatch, Datadog, etc.)Yes
ElasticsearchWatcher webhookWatch ID, search results, aggregations, cluster healthNo
SigNozPrometheus-compatibleLabels, annotations + OpenTelemetry enrichment (traces, logs, metrics)No

These integrations push updates from Overwatch to external systems:

PlatformEvents SentConfiguration
SlackIncident created, severity changed, status changed, resolution foundIncoming webhook URL
  1. Create integration in Overwatch (Settings > Integrations > Add Integration)
  2. Copy the webhook URL generated for your platform
  3. Configure your monitoring tool to send alerts to that URL
  4. Test the connection using the monitoring platform’s test feature
  5. Verify in Overwatch that alerts arrive and parse correctly

Each integration has its own webhook URL, so you can create separate integrations per environment (production, staging) or per team.

All platforms are normalized into Overwatch’s standard alert schema:

  • Title — Alert name or incident summary
  • Severity — Mapped to Critical / High / Medium / Low
  • Source — Originating platform
  • Service — Affected service name (extracted from tags/labels)
  • Description — Alert details and context
  • Metadata — All platform-specific fields preserved for AI analysis

Alerts from different platforms about the same issue are grouped into a single incident. See Incident Deduplication for details on how fingerprint matching and semantic similarity work across platforms.

The Chrome extension automatically activates when you visit supported monitoring platforms, providing contextual AI chat, incident search, and resolution suggestions without leaving your monitoring dashboard.

For step-by-step instructions on connecting each platform, see the individual integration guides listed above or the Integration Setup workflow.